Volume 1, Issue 3, August 2013

Abstract -
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call Admission Control) to improve VNSIP Performances.

Abstract -
As business activities are becoming increasing globally and as numerous firms expand their operations into overseas markets, there is need for human resource management (HRM) to ensure that they hire and keep good employees. From ages, firms/organizations have been having great problems in getting the right professionals into appropriate jobs and training. This research focuses at exploiting information technology in order to overcome these problems. The system, which is a network of interâ€“related processes, collects data from applicants through a web-based interface and matches with appropriate jobs. This prevents the frustration and some other problems inherent in the manual method of job recruitment, which is the traditional unstructured interview and knowledge based method for matching applicants to jobs. The proposed system is a neural network web-based human resource management system model running on Internet Information (IIS) server with capabilities for Active Server Page (ASP) and Microsoft Access; while Hypertext Markup Language (HTML) are used for authoring web pages. Finally, the system can run on the minimum Pentium machines with Windows XP operating system.

Departement of Communications, Military Technical College, EgyptMisr International University, EgyptArab Academy for Science and Technology and Maritime Transport (AASTMT)Technical Research Center of the Armed Forces, Egypt

Abstract -
Boolean functions play important role in cryptography, since in convention a symmetric encryption algorithm can be designed by composing Boolean functions satisfying good cryptographic criteria. In this paper; state of the art in mathematical and practical study of the most important cryptographic criteria of Boolean functions and how to implement algorithms that fulfill these criteria are introduced. Also; the most known constructions for generating Boolean functions that satisfy good cryptographic criteria are summarized.

Abstract -
Cloud Computing is one of the rapidly adopted technology in the field of Information and Communication Technology (ICT) in which resources (like processor and storage devices) can be rented out and released by the Cloud customer by using the Internet in on-demand basis. Information Security issues in Cloud Computing hold vital importance as the global economy depends upon the secure flow of information within the organization and exchange of information with other organization (private and public Cloud). To measure security in Cloud Computing at each level, Information Security metrics are better tools that help the organization to take good decisions on the base of qualitative and quantitative analysis, performance reports, efficiency and effectiveness of the implemented standard or certification security controls. SLA metrics are mostly used to evaluate performance of the service object but not to measure Information Security risks. These service objects can be further categorized as Hardware, Software, Network, Storage and Help Desk / Service Desk. Each object has its own quality metrics and can be combined to form a complex and compound service. COBIT is IT Governance framework which is widely used in IT industry. It covers several areas of IT Governance. Information Security is the part of this framework and the same part can be used to build SLA based Information Security Metrics in Cloud Computing. To obtain Information Security Metrics particularly for Cloud Computing, a criteria have been developed and Information Security Metrics are developed accordingly to facilitate both Cloud Customers and Cloud Service Providers.

Sir Syed University of Engineering and Technology, Deparment of Telecommunication Department of Mathematics, Department of Electronics

Abstract -
In this paper, we present a new structure to develop 64-bit RSA encryption engine on FPGA that can be used as a standard device in the secured communication system. The RSA algorithm has three parts i.e. key generation, encryption and decryption. The algorithm also requires random prime numbers so a primality tester is also design to meet the needs of the algorithm. We use right-to-left-binary method for the exponent calculation. This reduces the number of cycles enhancing the performance of the system and reducing the area usage of the FPGA. These blocks are coded in Verilog and are synthesized and simulated in Xilinx 13.2 design suit.